You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
merlin fails tests on big endian machines dalek-cryptography/merlin#60 (comment), due to some underlying casting that isn't respectful of endianness. It probably isn't a security issue, but I don't like it.
Currently there are two PRs on two different merlin repos that fix this.
I'd wager deterministic batch verification is not used by many people yet, and this crates gets it wrong anyways, and ed25519-zebra uses Sha512 for this. I'd swap in Sha512 now and slap on a warning that deterministic batching is unstable.
You need the validity criteria to be permissive like ed25519-zebra, not merely in the batch verification but in the stand along verification too. It's not I think deterministic batch verification otherwise.
It's merely an xof that sha512 lacks, not the full transcript functionality, so you'd hash the batch and then expand via cloning the sha512 state or chacha or whatever ed25519-zebra does. I like merlin but it's a dependency and ed25519 uses sha512
merlin
fails tests on big endian machines dalek-cryptography/merlin#60 (comment), due to some underlying casting that isn't respectful of endianness. It probably isn't a security issue, but I don't like it.Currently there are two PRs on two different
merlin
repos that fix this.dalek-cryptography/merlin
this replaces the STROBE impl entirely withstrobe-rs
zkcrypto/merlin
this fixes the incorrect cast that the keccakf function doesIf we don't have write access to either repo, we might have to fork and maintain yet another :(
The text was updated successfully, but these errors were encountered: